최신 312-39 무료덤프 - EC-COUNCIL Certified SOC Analyst (CSA)
Jony, a security analyst, while monitoring IIS logs, identified events shown in the figure below.

What does this event log indicate?

What does this event log indicate?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following event detection techniques uses User and Entity Behavior Analytics (UEBA)?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following process refers to the discarding of the packets at the routing level without informing the source that the data did not reach its intended recipient?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following formula represents the risk?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
An attacker, in an attempt to exploit the vulnerability in the dynamically generated welcome page, inserted code at the end of the company's URL as follows:
http://technosoft.com.com/<script>alert("WARNING: The application has encountered an error");</script>.
Identify the attack demonstrated in the above scenario.
http://technosoft.com.com/<script>alert("WARNING: The application has encountered an error");</script>.
Identify the attack demonstrated in the above scenario.
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following data source will a SOC Analyst use to monitor connections to the insecure ports?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following command is used to enable logging in iptables?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
What does [-n] in the following checkpoint firewall log syntax represents?
fw log [-f [-t]] [-n] [-l] [-o] [-c action] [-h host] [-s starttime] [-e endtime] [-b starttime endtime] [-u unification_scheme_file] [-m unification_mode(initial|semi|raw)] [-a] [-k (alert name|all)] [-g] [logfile]
fw log [-f [-t]] [-n] [-l] [-o] [-c action] [-h host] [-s starttime] [-e endtime] [-b starttime endtime] [-u unification_scheme_file] [-m unification_mode(initial|semi|raw)] [-a] [-k (alert name|all)] [-g] [logfile]
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Identify the attack, where an attacker tries to discover all the possible information about a target network before launching a further attack.
정답: C
설명: (DumpTOP 회원만 볼 수 있음)